A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
There is a limitation for a RFID reader to read thousands of data provided by RFID tags in a second. Hence, multiple RFID readers configuration is required to help resolving this scenario. In real world applications of RFID system, there will be a lot of configurations for RFID reader and RFID tag s...
| Main Author: | Tan , Aik Theng |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42770/ |
| Abstract | Abstract here |
Similar Items
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Missing tags detection algorithm for radio frequency identification (RFID) data stream
by: Zainudin, Nur 'Aifaa
Published: (2019)
by: Zainudin, Nur 'Aifaa
Published: (2019)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
Needs analysis on 2-Dimensional Quick Response (QR) code as a mobile
tag in genetically modified food tagging services.
by: Long , Yoon Foo
Published: (2010)
by: Long , Yoon Foo
Published: (2010)
Tagpreneur
Genetically Modified Food Mobile Tagging
Services
by: Long , Yoon Foo
Published: (2010)
by: Long , Yoon Foo
Published: (2010)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
An Efficient Distributed Slotted Multi-Hop Wireless Mac Protocol For Internet Of Things
by: Sarvghadi, Mohammad Ali
Published: (2021)
by: Sarvghadi, Mohammad Ali
Published: (2021)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Hybrid Mac Protocol With Intra- Cluster Communications For Extending Wireless Sensor Network Lifetimes
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023)
by: Ghori, Muhammad Rizwan
Published: (2023)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Mobile Cloud And Cloudlets Gaming System (Mccg) Using Clustered Destination-Sequenced Distance Vector Routing Protocol(C-DSDV)
by: Doraisamy, Vaithegy
Published: (2020)
by: Doraisamy, Vaithegy
Published: (2020)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Effects Of Problem-Solving Strategies On Achievement And Motivation In Learning Chemistry In A Social Network Environment
by: Tan, Hong Looi
Published: (2016)
by: Tan, Hong Looi
Published: (2016)
Impact Of Enterprise Resource Planning (ERP) System Misfit On Information Quality : A Moderated Model Of Alignment Strategies
by: Tan, Shiang Yen
Published: (2012)
by: Tan, Shiang Yen
Published: (2012)
A Grid Meta-Scheduler Using Community Scheduler
Framework (Csf) With Different Plug-In Policies
Performance Evaluation
by: Tan , Zhen Ling
Published: (2008)
by: Tan , Zhen Ling
Published: (2008)
A study on sociability aspect in e-health community: a case on cancer community
by: Abdullah, Nor Athiyah
Published: (2011)
by: Abdullah, Nor Athiyah
Published: (2011)
A Sliding Adaptive Beta Distribution Model For Concept Drift Detection In A Dynamic Environment
by: Ature, Angbera
Published: (2025)
by: Ature, Angbera
Published: (2025)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Migration From A Relational Database To A Document-Oriented Database Based On Document-Oriented Data Schema
by: M S, Hamouda Shady
Published: (2020)
by: M S, Hamouda Shady
Published: (2020)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
A Framework For Flexible Data Consistency In Collaborative Editing
by: Omar , Mohd Adib
Published: (2009)
by: Omar , Mohd Adib
Published: (2009)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
A Continuous Overlay Path Probing Algorithm For Overlay Networks
by: Feily, Maryam
Published: (2013)
by: Feily, Maryam
Published: (2013)
A Privacy Framework And Guidelines For Psychiatric Behavioural Monitoring System
by: Ramli, Rusyaizila
Published: (2016)
by: Ramli, Rusyaizila
Published: (2016)
A Framework For Dynamic Updating In Component-based
Software Systems
by: Mohammed Alhazbi , Saleh
Published: (2009)
by: Mohammed Alhazbi , Saleh
Published: (2009)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
Similar Items
-
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011) -
Missing tags detection algorithm for radio frequency identification (RFID) data stream
by: Zainudin, Nur 'Aifaa
Published: (2019) -
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013) -
Needs analysis on 2-Dimensional Quick Response (QR) code as a mobile
tag in genetically modified food tagging services.
by: Long , Yoon Foo
Published: (2010) -
Tagpreneur
Genetically Modified Food Mobile Tagging
Services
by: Long , Yoon Foo
Published: (2010)
